Multiple SQL injection vulnerabilities in Enthrallweb eShopping Cart allow remote attackers to execute arbitrary SQL commands via (1) the ProductID parameter in (a) reviews.asp, or the (2) cat_id or (3) sub_id parameter in (b) subProducts.asp. NOTE: the productdetail.asp vector is already covered by another identifier.
References
Configurations
History
21 Nov 2024, 00:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://s-a-p.ca/index.php?page=OurAdvisories&id=21 - Exploit, URL Repurposed | |
References | () http://secunia.com/advisories/22955 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1906 - | |
References | () http://www.securityfocus.com/archive/1/451840/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21151 - | |
References | () http://www.vupen.com/english/advisories/2006/4578 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://s-a-p.ca/index.php?page=OurAdvisories&id=21 - Exploit, URL Repurposed |
Information
Published : 2006-11-24 17:07
Updated : 2024-11-21 00:21
NVD link : CVE-2006-6074
Mitre link : CVE-2006-6074
CVE.ORG link : CVE-2006-6074
JSON object : View
Products Affected
enthrallweb
- eshopping_cart
CWE